1<testcase> 2# Server-side 3<reply> 4<servercmd> 5REPLY PASV 227 Entering Passiv Mode (1216,256,2,127,127,127) 6</servercmd> 7</reply> 8 9# Client-side 10<client> 11<server> 12ftp 13</server> 14 <name> 15FTP getting bad host in 227-response to PASV 16 </name> 17 <command> 18ftp://%HOSTIP:%FTPPORT/237 --disable-epsv 19</command> 20</client> 21 22# Verify data after the test has been "shot" 23# The bogus address used here is chosen specifically so that when processed on 24# certain hosts with buggy resolver code, the resulting address (192.0.2.127) 25# is from an address block that is guaranteed never to be assigned (RFC3330). 26<verify> 27# curl: (15) Can't resolve new host 1216.256.2.127:32639 28# 15 => CURLE_FTP_CANT_GET_HOST 29# some systems just don't fail on the illegal host name/address but instead 30# moves on and attempt to connect to... yes, to what? 31# 7= CURLE_COULDNT_CONNECT 32<errorcode> 3315, 7 34</errorcode> 35<protocol> 36USER anonymous 37PASS ftp@example.com 38PWD 39PASV 40</protocol> 41</verify> 42</testcase> 43